Question No.91

Which technique allows specific VLANs to be strictly permitted by the administrator?

VTP pruning

transparent bridging

trunk allowed VLANs

VLAN access-list

L2P tunneling

Correct Answer: C

Explanation:

By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk. To restrict the traffic a trunk carries, use the quot;switchport trunk allowed vlan remove vlan-listquot; interface configuration command to remove specific VLANs from the allowed list.

Question No.92

Which statement describes what happens if all VSL connections between the virtual switch members are lost?

Both virtual switch members cease to forward traffic.

The VSS transitions to the dual active recovery mode, and both virtual switch members continue to forward traffic independently.

The virtual switch members reload.

The VSS transitions to the dual active recovery mode, and only the new active virtual switch continues to forward traffic.

Correct Answer: D

Explanation:

Q. What happens if all VSL connections between the virtual switch members are lost?

A.VSLs can be configured with up to eight links between the two switches across any combination of line cards or supervisor ports to provide a high level of redundancy. If for some rare reason all VSL connections are lost between the virtual switch members leaving both the virtual switch members up, the VSS will transition to the dual active recovery mode.

The dual active state is detected rapidly (subsecond) by any of the following three methods: Enhancement to PAgP used in MEC with connecting Cisco switches

L3 Bidirectional Forwarding Detection (BFD) configuration on a directly connected link (besides VSL) between virtual switch members or through an L2 link through an access layer switch

In the dual active recovery mode, all interfaces except the VSL interfaces are in an operationally shut down state in the formerly active virtual switch member. The new active virtual switch continues to forward traffic on all links.

Question No.93

A network engineer wants to add a new switch to an existing switch stack. Which configuration must be added to the new switch before it can be added to the switch stack?

No configuration must be added.

stack ID

IP address

VLAN information

VTP information

Correct Answer: A

Explanation:

Switch Stack Offline Configuration

You can use the offline configuration feature toprovision(to supply a configuration to) a new switch before it joins the switch stack. You can configure in advance the stack member number, the switch type, and the interfaces associated with a switch that is not currently part of the stack. The configuration that you create on the switch stack is called the provisioned configuration. The switch that is added to the switch stack and that receives this configuration is called theprovisioned switch. You manually create the provisioned configuration through theswitchstack- member-numberprovisiontypeglobal configuration command. The provisioned configuration is automatically created when a switch is added to a switch stack and when no provisioned configuration exists.

When you configure the interfaces associated with a provisioned switch (for example, as part of a VLAN), the switch stack accepts the configuration, and the information appears in the running configuration. The interface associated with the provisioned switch is not active, operates as if it is administratively shut down, and theno shutdowninterface configuration command does not return it to active service. The interface associated with the provisioned switch does not appear in the display of the specific feature; for example, it does not appear in theshow vlanuser EXEC command output.

The switch stack retains the provisioned configuration in the running configuration whether or not the provisioned switch is part of the stack. You can save the provisioned configuration to the startup configuration file by entering thecopy running-config startup- configprivileged EXEC command. The startup configuration file ensures that the switch stack can reload and can use the saved information whether or not the provisioned switch is part of the switch stack.

Effects of Adding a Provisioned Switch to a Switch Stack

When you add a provisioned switch to the switch stack, the stack applies either the provisioned configuration or the default configuration.Table 5-1lists the events that occur when the switch stack compares the provisioned configuration with the provisioned switch.

Table 5-1Results of Comparing the Provisioned Configuration with the Provisioned Switch Scenario

Result

The stack member numbers and the switch types match. 1.

If the stack member number of the provisioned switch matches the stack member number in the provisioned configuration on the stack, and

2.

If the switch type of the provisioned switch matches the switch type in the provisioned configuration on the stack.

The switch stack applies the provisioned configuration to the provisioned switch and adds it to the stack.

The stack member numbers match but the switchtypes do not match. 1.

If the stack member number of the provisioned switch matches the stack member number in the provisioned configuration on the stack, but

2.

The switch type of the provisioned switch does not match the switch type in the provisioned configuration on the stack.

The switch stack applies the default configuration tothe provisioned switch and adds it to the stack.

The provisioned configuration is changed to reflect the new information.

The switch stack applies the default configuration to the provisioned switch and adds it to the stack.

The provisioned configuration is changed to reflect the new information.

The stack member number of the provisioned switch is in conflict with an existing stack member. The stack master assigns a new stack member number to the provisioned switch.

The stack member numbers and the switch types match: 1.

If the new stack member number of the provisioned switch matches the stack member number in the provisioned configuration on the stack, and

2.

If the switch type of the provisioned switch matches the switch type in the provisioned configuration on the stack.

The switch stack applies the provisioned configuration to the provisioned switch and adds it to the stack.

The provisioned configuration is changed to reflect the new information.

The stack member numbers match, but the switch types do not match: 1.

If the stack member number of the provisioned switch matches the stack member number in the provisioned configuration on the stack, but

2.

The switch type of the provisioned switch does not match the switch type in the provisioned configuration on the stack.

The switch stack applies the default configuration to the provisioned switch and adds it to the stack.

The provisioned configuration is changed to reflect the new information.

The stack member number of the provisioned switch is not found in the provisioned configuration.

The switch stack applies the default configuration to the provisioned switch and adds it to the stack.

Question No.94

You have been asked to install and configure a new switch in a customer network. Use the console access to the existing and new switches to configure and verify correct device configuration.

Examine the VTP configuration. You are required to configure private VLANs for a new server deployment connecting to the SW4 switch. Which of the following configuration steps will allow creating private VLANs?

Disable VTP pruning on SW1 only

Disable VTP pruning on SW2 only

Disable VTP pruning on SW4 only

Disable VTP pruning on SW2, SW4 and New_Switch

Disable VTP pruning on New_Switch and SW4 only.

Correct Answer: C

Explanation:

To create private VLANs, you will need to only disable pruning on the switch that contains the private VLANs. In this case, only SW4 will connect to servers in a private VLAN.

Question No.95

What is the maximum number of 10 Gigabit Ethernet connections that can be utilized in an EtherChannel for the virtual switch link?

You can set a combined maximum of two local SPAN sessions and RSPAN source sessions. You can have a total of 66 SPAN and RSPAN sessions on a switch or switch stack.

You can monitor traffic on a single VLAN or on a series or range of ports or VLANs. You select a series or range of VLANs by using the [ , | -] options.

If you specify a series of VLANs, you must enter a space before and after the comma. If you specify a range of VLANs, you must enter a space before and after the hyphen ( -).

VLAN filtering refers to analyzing network traffic on a selected set of VLANs on trunk source ports. By default, all VLANs are monitored on trunk source ports. You can use the monitor session session_number filter vlan vlan-id command to limit SPAN traffic on trunk source ports to only the specified VLANs.

VLAN monitoring and VLAN filtering are mutually exclusive. If a VLAN is a source, VLAN filtering cannot be enabled. If VLAN filtering is configured, a VLAN cannot become a source.

Question No.97

A network engineer has just deployed a non-Cisco device in the network and wants to get information about it from a connected device. Cisco Discovery Protocol is not supported, so the open standard protocol must be configured. Which protocol does the network engineer configure on both devices to accomplish this?

IRDP

LLDP

NDP

LLTD

Correct Answer: B

Explanation:

The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP performs functions similar to several proprietary protocols, such as the Cisco Discovery Protocol (CDP).

Question No.98

After the implementation of several different types of switches from different vendors, a network engineer notices that directly connected devices that use Cisco Discovery Protocol are not visible. Which vendor-neutral protocol could be used to resolve this issue?

Local Area Mobility

Link Layer Discovery Protocol

NetFlow

Directed Response Protocol

Correct Answer: B

Explanation:

The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol in the Internet Protocol Suite used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. LLDP performs functions similar to several proprietary protocols, such as the Cisco Discovery Protocol (CDP).

Question No.99

What effect does the mac address-table aging-time 180 command have on the MAC address- table?

This is how long a dynamic MAC address will remain in the CAM table.

The MAC address-table will be flushed every 3 minutes.

The default timeout period will be 360 seconds.

ARP requests will be processed less frequently by the switch.

The MAC address-table will hold addresses 180 seconds longer than the default of 10 minutes.

Correct Answer: A

Explanation:

You can configure the amount of time that an entry (the packet source MAC address and port that packet ingresses) remain in the MAC table. To configure the aging time for all MAC addresses, perform this task:

Command Purpose Step 1

switch#configure terminal Enters configuration mode.

Step 2

switch(config)#mac-address-table aging-timeseconds[vlanvlan_id]

Specifies the time before an entry ages out and is discarded from the MAC address table. The range is from 0 to 1000000; the default is 300 seconds. Entering the value 0 disables the MAC aging. If a VLAN is not specified, theaging specification applies to all VLANs.

This example shows how to set the aging time for entries in the MAC address table to 600 seconds (10 minutes):